Statistics

    Map

Twitter

Using Netflow Protocols to Identify and Assess the Network Packet Flows in Unsecured Network Environments
( Vol-4,Issue-12,December 2017 )
Author(s):

Desta Dana

Keywords:

Assess, Environments, Identify, NetFlow Protocol, Network, Packet Flow, Unsecured.

Abstract:

The Network Packet Flow is analyzed and defined by the network administers in the company to assure the exact data flow in the networked systems. Currently, in the world the data flow is unreliable in the internet because of unreliability of the internet. So in My research I dully answered to identify and asses the network administrator can record the ingress and egress of the packet flow-in and flow-out in the routers respectively. Therefore the network environment is reliable, identified and assessed by using the network simulators called packet tracer and the protocol of NETFLOW protocol implementation in this research works.

ijaers doi crossref DOI:

10.22161/ijaers.4.12.9

Paper Statistics:
  • Total View : 184
  • Downloads : 15
  • Page No: 047-052
Cite this Article:
MLA
Desta Dana et al ."Using Netflow Protocols to Identify and Assess the Network Packet Flows in Unsecured Network Environments". International Journal of Advanced Engineering Research and Science(ISSN : 2349-6495(P) | 2456-1908(O)),vol 4, no. 12, 2017, pp.047-052 AI Publications, doi:10.22161/ijaers.4.12.9
APA
Desta Dana(2017).Using Netflow Protocols to Identify and Assess the Network Packet Flows in Unsecured Network Environments. International Journal of Advanced Engineering Research and Science(ISSN : 2349-6495(P) | 2456-1908(O)),4(12), 047-052. http://dx.doi.org/10.22161/ijaers.4.12.9
Chicago
Desta Dana. 2017,"Using Netflow Protocols to Identify and Assess the Network Packet Flows in Unsecured Network Environments". International Journal of Advanced Engineering Research and Science(ISSN : 2349-6495(P) | 2456-1908(O)).4(12):047-052. Doi: 10.22161/ijaers.4.12.9
Harvard
Desta Dana. 2017,Using Netflow Protocols to Identify and Assess the Network Packet Flows in Unsecured Network Environments, International Journal of Advanced Engineering Research and Science(ISSN : 2349-6495(P) | 2456-1908(O)).4(12), pp:047-052
IEEE
Desta Dana."Using Netflow Protocols to Identify and Assess the Network Packet Flows in Unsecured Network Environments", International Journal of Advanced Engineering Research and Science(ISSN : 2349-6495(P) | 2456-1908(O)),vol.4,no. 12, pp.047-052,2017.
Bibtex
@article {destadana2017using,
title={Using Netflow Protocols to Identify and Assess the Network Packet Flows in Unsecured Network Environments},
author={Desta Dana},
journal={International Journal of Advanced Engineering Research and Science},
volume={4},
year= {2017},
}
Share:
References:

[1] https://en.wikipedia.org/wiki/NetFlow,
[2] https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ios-netflow/prod_white_paper0900aecd80406232.html, Accessed on Date July 15, 2017
[3] http://searchnetworking.techtarget.com/definition/ingress-filtering.\
[4] Eric D.Kolayzak(2014), Statistical Analysis of Network Data, Dept of Mathematics and Statistics, Boston University, ppt(1-50).
[5] https://www.netfort.com/wp-content/uploads/PDF/WhitePapers/NetFlow-Vs-Packet-Analysis-What-Should-You-Choose.pdf, Accessed on Date July 15, 2017.
[6] http://en.wikipedia.org/wiki/Traffic_analysis. Accessed on Date Oct 12,2017
[7] http://en.wikipedia.org/wiki/Port_mirroring. Accessed on Date Oct 12,2017
[8] http://unroutable.blogspot.com/2012/04/why-netflow-isnt-web-usage-tracker.html. Accessed on Date Oct 19,2017